Wednesday, 27 January 2016
The top 5 super tough smartphones that can withstand almost anything
Saturday, 9 January 2016
– Slows down the router’s processing capability
– Fades the presence of your website. It is not visible even after you type in the keyword.
– The contents are no longer accessible
– Affects site promotion and revenue earning of the firm
– Weak services and denial of resources, will be experienced
– Attacks the system and services.
– Must offer services, whenever required
– The customer service help should be available, throughout the day
– Emergency assistance should be available
– You can also install other techniques like verification, implement sudden traffic checking, and install software to maintain clean sites.
– Cleaning pipes or IPS based prevention methods are also helpful.
Friday, 16 October 2015
Game of a life time .CHECK IT OUT¡!!!!!!!!!!!!
Wednesday, 14 October 2015
Racing fever
Friday, 9 October 2015
Hide Folders on Android devices; learn how to hide files/folders on your Android smartphones and tablets
Easy way to secure your Files and Folders
in Android, here is how to hide files and
folders on Android devices
Android smartphone has become the
greatest boon in today’s life and most of
the people would love to own an Android
device, this is true for youngsters as well
as oldies. Android is an operating system
which provides many features to the user
and hence it has gained such a vast
publicity in a small time span.
Now, users also happen to save some
important documents or personal videos
and images or information in the Android
for their convenience. It could happen that
the smartphone may be accessible to
friends or some family members and could
be a case wherein they might land up
getting access to this extremely
confidential information which user does
not want to share with anyone. If you are
one of those who want to hide your files or
folders from such unwanted access please
read the below instructions and safely hide
your files and folders from anyone who
gets access to your phone:
Check if your Android device has
the file explorer; mostly it would be
available; however if your device
does not have one then download
the very versatile ES File Explorer
File Manager from https://
play.google.com/store/apps/
details?
id=com.estrongs.android.pop&hl=en
Open the file explorer also known
as file browser and search for your
file which has your confidential
data that you do not wish to share
with anyone
You need to select the file or the
folder and click on the “rename”
option
Now put “a dot” in the prefix that
means put this sign prior to the
name of the file or folder (for e.g.
If you want to save some folder
which has images then you need to
put dot in front of the name of the
folder as given here – .images )
Basically Android is Linux based
and when we use a (.) it thinks that
this is a system file and by default
it will hide this file or the respective
folder……easy isn’t it?
If you want to open this hidden file
it is simple, just go to your file
explorer and select this option
“Show hidden file or folder”
Suppose someday you feel that
now that folder need not be in a
hidden state all you need to do is
rename the file by removing the (.)
for e.g. if your file was “.image”
now make it “image”….as simple as
that.
Just by following these simple steps user
can easily hide their files or folders from
unwanted intrusions. So the data is now
totally secured in the Android system and
it cannot be seen either in gallery or in
explorer. Not only that if user wants to get
their file back from hidden mode even that
is possible and user can hide and unhide
their important data umpteen times.
Besides this user can also use the
Applock to protect their applications from
intruders. As the name suggests it
provides privacy to the users. Important
videos or pictures, chats and even sms,
contacts and other apps like Facebook,
Gmail……many more can be password
protected from other users who might use
their Android device, for e.g. friends or kids
borrowing the Android device to play
games.
User needs to open the Applock, go to the
Left side menu and in the settings they
can lock the required applications from
intruders. To unlock these applications
either user can enter “ #password ” in their
dial pad, and tap call button to open
AppLock. Or the Applock can be unlocked
by putting “domobile.com/applock” and
opening the website in the browser. User
can also protect other users from
unlocking their Applock by using the
advanced settings option given in the main
menu of Applock. The Applock is available
in 3 methods: 1) Paid 2) Free and with ads
3) Free version.
Users can avail Applock through this
site: This Applock can be downloaded from
here
To ensure that all the files and contents of
the Android device is always protected
users need to follow the above given
steps. So wishing all users and era of
privacy!!
The Different Types of Computer Viruses
A computer virus is a program designed to harm or cause harm on an infected computer. Its
spreads through e-mail attachments, portable devices, websites containing malicious scripts
and file downloads. A computer virus attaches itself to the host files and always activate whenever you open the infected files. The virus
can replicate itself and then infect the other files on your computer causing more damage. Below
is a list of different types of computer viruses and what they do
These viruses infect the files created using some applications or programs that contain macros
such as doc, pps, xls and mdb. They
automatically infect the files with macros and also templates and documents that are
contained in the file. They hide in documents shared through e-mail and networks.
Macro viruses include:
Relax
bablas
Melissa.A
097M/Y2K
They usually fix themselves inside the computer memory. They get activated every time the OS
runs and end up infecting other opened files.
They hide in RAM.
Memory Resident Viruses Include:
CMJ
meve
randex
mrklunky
These types of viruses delete any information in a file they infect, leaving them partially or
completely useless once they are infected. Once in the computer, they replaces all the file content but the file size doesn’t change.
Overwrite Viruses Include:
Trj.Reboot
way
trivial.88.D
These viruses mainly replicate or take action once they are executed. When a certain condition is met, the viruses will act by infecting
the files in the directory or the folder specified in the AUTOEXEC.BAT. The viruses are generally found in the hard disk’s root directory, but they
keep on changing location.
Direct Action Viruses Include:
Vienna virus
Also known as cluster virus or file system virus.
They infect the computer’s directory by changing the path indicating file location. They are usually
located in the disk but affect the entire directory.
Directory Viruses Include:
dir-2 virus
Most web pages include some complex codes in order to create an interactive and interesting
content. Such a code is often exploited to cause certain undesirable actions. They mostly
originate from the infected web pages or browsers.
Web Scripting Viruses Include:
JS.Fortnight – a virus that spreads via malicious
emails.
These type of viruses spread in many different ways. Their actions vary depending on the OS
installed and presence of certain files. They tend to hide in the computer’s memory but do not
infect the hard disk.
Multipartite Viruses Include:
flip
invader
tequila
These lardy viruses attack the file allocation table (FAT) which is the disc part used to store
every information about the available space,location of files, unusable space etc.
FAT Viruses Include:
the link virus
These types of viruses infect files just like the direct action and the resident types. Once inside
the computer, they ‘accompany’ other existing files.
Companion Viruses Include:
Asimov.1539
stator and terrax.1069
They encode or encrypt themselves in a different way every time they infect your computer. They use different encryption and algorithms. This makes it difficult for the antivirus software to locate them using signature or string searches
(since they are very different in each
encryption).
Polymorphic Viruses Include:
Marburg
tuareg
Satan bug
elkern
This program is very similar to a virus and has the ability to self-replicate leading to negative
effects on your computer.
Worm Viruses Include:
lovgate.F
sobig.D
trile. C
PSWBugbear.B
Mapson
Trojans can illegally trace important login details of users online. For example E-Banking is very common among users, therefore, vulnerability of tracing your login details whenever your PC is working without any strong powerful antivirus
installed.This is a virus spread via an email. Such a virus will hide in an email and when the recipient
opens the mail.This virus can spread in many different ways including a voluntary download. If infects certain
browser functions especially in form of re-directing the user automatically to certain sites.A good example is
Browser Hijackers Include:
the cool web search
They include the boot sector plus master boot record types. All the viral codes can be separate
location; however they infect the hard disks or the floppy.
Boot Infectors Include:
the brain virus -it is the very first wild virus to be created.From what we have seen, the many types of
computer viruses and their effects are very harmful and can completely damage your system. Always make sure your system is up to
date. Also install antivirus software. The antivirus program protects your computer and the personal information in it